First published: Tue Mar 14 2023(Updated: )
Due to insufficient input sanitization, SAP ABAP - versions 751, 753, 753, 754, 756, 757, 791, allows an authenticated high privileged user to alter the current session of the user by injecting the malicious database queries over the network and gain access to the unintended data. This may lead to a high impact on the confidentiality and no impact on the availability and integrity of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP ABAP Platform | =751 | |
SAP ABAP Platform | =753 | |
SAP ABAP Platform | =754 | |
SAP ABAP Platform | =756 | |
SAP ABAP Platform | =757 | |
SAP ABAP Platform | =791 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25615 is a vulnerability in SAP ABAP versions 751, 753, 754, 756, 757, 791 that allows an authenticated high privileged user to alter the current session of the user by injecting malicious database queries over the network and gain access to unintended data.
The severity of CVE-2023-25615 is medium with a CVSS score of 4.9.
CVE-2023-25615 affects SAP ABAP versions 751, 753, 754, 756, 757, 791.
An attacker can exploit CVE-2023-25615 by injecting malicious database queries over the network to alter the current session of the user and gain access to unintended data.
Yes, you can find references for CVE-2023-25615 at the following links: [Reference 1](https://launchpad.support.sap.com/#/notes/3289844), [Reference 2](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html).